Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA3YzktanFocS12cjN2

Remote Code Execution in markdown-pdf

Versions of markdown-pdf prior to 9.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize HTML code in markdown files. If markdown files with malicious HTML are converted to PDF, the resulting PDF file will execute any JavaScript code in the original markdown file. This may allow attackers to execute Remote Code.

Recommendation

Upgrade to version 9.0.0 or later.

Permalink: https://github.com/advisories/GHSA-p7c9-jqhq-vr3v
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA3YzktanFocS12cjN2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 6 years ago
Updated: about 1 year ago


CVSS Score: 5.5
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-p7c9-jqhq-vr3v, CVE-2018-3770
References: Blast Radius: 14.0

Affected Packages

npm:markdown-pdf
Dependent packages: 69
Dependent repositories: 358
Downloads: 23,636 last month
Affected Version Ranges: < 9.0.0
Fixed in: 9.0.0
All affected versions: 0.0.0, 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.3.0, 0.4.0, 0.4.1, 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0, 2.0.0, 2.1.0, 2.2.0, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0, 4.0.1, 5.0.0, 5.1.0, 5.1.1, 5.2.0, 5.3.0, 6.0.0, 7.0.0, 8.0.0, 8.1.0, 8.1.1
All unaffected versions: 9.0.0, 10.0.0, 11.0.0